[go: up one dir, main page]

US20190073465A1 - Ic card, portable electronic device, and method of controlling an ic card - Google Patents

Ic card, portable electronic device, and method of controlling an ic card Download PDF

Info

Publication number
US20190073465A1
US20190073465A1 US16/177,868 US201816177868A US2019073465A1 US 20190073465 A1 US20190073465 A1 US 20190073465A1 US 201816177868 A US201816177868 A US 201816177868A US 2019073465 A1 US2019073465 A1 US 2019073465A1
Authority
US
United States
Prior art keywords
biometric information
degree
similarity
card
cpu
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US16/177,868
Other languages
English (en)
Inventor
Ryouichi Kuriyama
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Toshiba Corp
Toshiba Infrastructure Systems and Solutions Corp
Original Assignee
Toshiba Corp
Toshiba Infrastructure Systems and Solutions Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Toshiba Corp, Toshiba Infrastructure Systems and Solutions Corp filed Critical Toshiba Corp
Assigned to KABUSHIKI KAISHA TOSHIBA, TOSHIBA INFRASTRUCTURE SYSTEMS & SOLUTIONS CORPORATION reassignment KABUSHIKI KAISHA TOSHIBA ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: KURIYAMA, RYOUICHI
Publication of US20190073465A1 publication Critical patent/US20190073465A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/76Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in application-specific integrated circuits [ASIC] or field-programmable devices, e.g. field-programmable gate arrays [FPGA] or programmable logic devices [PLD]
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/073Special arrangements for circuits, e.g. for protecting identification code in memory
    • G06K19/07309Means for preventing undesired reading or writing from or onto record carriers
    • G06K19/07345Means for preventing undesired reading or writing from or onto record carriers by activating or deactivating at least a part of the circuit on the record carrier, e.g. ON/OFF switches
    • G06K19/07354Means for preventing undesired reading or writing from or onto record carriers by activating or deactivating at least a part of the circuit on the record carrier, e.g. ON/OFF switches by biometrically sensitive means, e.g. fingerprint sensitive
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/077Constructional details, e.g. mounting of circuits in the carrier

Definitions

  • Embodiments of the present invention relate to an IC card, a portable electronic device, and a method of controlling an IC card.
  • the IC card When receiving a command from a processing device (an IC card processing device) that processes an IC card, the IC card (a portable electronic device) executes processing according to the received command. Further, a biometric authentication system for authenticating (verifying) an owner (a user) of an IC card using such the IC card and the IC card processing device has been put to practical use.
  • An IC card used in a biometric authentication system stores in advance biometric information (registered biometric information) acquired from a humanbeings' body such as a fingerprint, a face, a vein, an iris, and the like.
  • the IC card processing device or the IC card reads biometric information (read biometric information) from the humanbeings' biological body.
  • the IC card calculates a degree of similarity between the read biometric information and the registered biometric information.
  • the IC card determines that the verfication success when a calculated degree of similarity is equal to or greater than a preset threshold value, and determines that the verfication failure when the calculated degree of similarity is less than the preset threshold value.
  • Patent document 1 Japanese patent application publication NO. 2013-120540
  • the read biometric information fluctuates depending on conditions (reading conditions) such as performance of the device that performs reading, humidity, and air temperature.
  • reading conditions such as performance of the device that performs reading, humidity, and air temperature.
  • the threshold value used for comparison with the calculated degree of similarity is determined by the specification of the biometric authentication system and is fixed. For this reason, there is a problem that there is a possibility that a verfication result varies depending on the reading conditions.
  • An object of the present invention is to provide an IC card, a portable electronic device, and a control method of an IC card capable of realizing stable authentication.
  • an IC card includes a communication unit, a storage unit, a biometric information acquisition unit, a degree of similarity calculation unit, and a response control unit.
  • the communication unit communicates with an external device.
  • the storage unit stores in advance first biometric information.
  • the biometric information acquisition unit acquires second biometric information read from a humanbeings' biological body.
  • the degree of similarity calculation unit calculates a degree of similarity between the first biometric information and the second biometric information.
  • the response control unit transmits information indicating a level of the degree of similarity to the external device by the communication unit.
  • FIG. 1 is an explanatory diagram for explaining an example of a biometric authentication system according to one embodiment.
  • FIG. 2 is an explanatory diagram for explaining an example of a verification command according to one embodiment.
  • FIG. 3 is an explanatory diagram for explaining an example of an IC card according to one embodiment.
  • FIG. 4 is an explanatory diagram for explaining a correspondence relationship among a biometric type, biometric information, and a verification algorithm according to one embodiment.
  • FIG. 5 is an explanatory diagram for explaining a correspondence relationship between a threshold value range and information indicating a level of a degree of similarity according to one embodiment.
  • FIG. 6 is an explanatory diagram for explaining an example of an operation of the IC card according to one embodiment.
  • FIG. 7 is an explanatory diagram for explaining a functional unit executed by a CPU of the IC card according to one embodiment.
  • FIG. 1 is an explanatory diagram for explaining an example of the biometric authentication system 1 .
  • the biometric authentication system 1 includes an IC card processing device 2 and an IC card 3 .
  • the biometric authentication system 1 is a system for authenticating a user of the IC card 3 by using biometric information read from a humanbeings' biological body.
  • the IC card processing device 2 communicates with the IC card 3 possessed by the user, and causes the IC card 3 to execute a verification process.
  • the IC card processing device 2 includes a CPU 11 , an ROM 12 , an RAM 13 , a nonvolatile memory 14 , a card reader writer 15 , a humanbeings' biological body sensor 16 , a display 17 , an operation unit 18 , and a communication unit 19 .
  • the CPU 11 is an arithmetic element (for example, a processor) that executes arithmetic processing.
  • the CPU 11 performs various processes on the basis of data such as programs stored in the ROM 12 or the nonvolatile memory 14 .
  • the CPU 11 By executing the programs stored in the ROM 12 or the nonvolatile memory 14 , the CPU 11 functions as a control unit capable of executing various operations.
  • the ROM 12 is a read-only nonvolatile memory.
  • the ROM 12 stores programs and data used in the programs.
  • the RAM 13 is a volatile memory that functions as a working memory.
  • the RAM 13 temporarily stores data under processing of the CPU 11 and the like. Further, the RAM 13 temporarily stores programs executed by the CPU 11 .
  • the nonvolatile memory 14 is a storage medium capable of storing various information.
  • the nonvolatile memory 14 stores programs and data used by the programs.
  • the nonvolatile memoryl 4 is, for example, a solid state drive (SSD), a hard disk drive (HDD), or other storage device.
  • SSD solid state drive
  • HDD hard disk drive
  • a memory I/F such as a card slot into which a storage medium such as a memory card can be inserted may be provided.
  • the card reader writer 15 is an interface device for communicating with the IC card 3 .
  • the card reader writer 15 transmits and receives data to and from the IC card 3 by contact communication or contactless communication.
  • the biological sensor 16 reads biometric information from the user of the IC card 3 .
  • the biological sensor 16 acquires the biometric information on a fingerprint of the user of the IC card 3 .
  • the biological sensor 16 acquires an image of the fingerprint of the user of the IC card 3 , and acquires fingerprint data as the biometric information from the acquired fingerprint image.
  • the biological sensor 16 may be configured to read the biometric information on a face, vein, iris, etc. of the user of the IC card 3 .
  • the biometric information read by the biological sensor 16 from the user of the IC card 3 is referred to as read biometric information.
  • the display 17 displays an image in response to a video signal input from a display control unit (not shown) such as the CPU 11 or a graphic controller.
  • a display control unit such as the CPU 11 or a graphic controller.
  • the operation unit 18 generates an operation signal on the basis of an operation of an operation member.
  • the operation member is, for example, a touch sensor, a numeric keypad, a keyboard, or the like.
  • the touch sensor is, for example, a resistive layer type touch sensor, a capacitance type touch sensor, or the like. That is, the touch sensor acquires information indicating a specified position within a certain region.
  • the touch sensor is integrated with the display 17 to form a touch screen, and the touch sensor inputs a signal indicating a touched position on the display 17 to the CPU 11 .
  • the communication unit 19 is a circuitry for communicating with other electronic devices.
  • the communication unit 19 is configured to be connectable to a network, for example.
  • the communication unit 19 communicates with other electronic devices via the network.
  • the CPU 11 of the IC card processing device 2 having the above configuration performs an activation process for activating the IC card 3 by supplying electric power to the IC card 3 via the card reader writer 15 . As a result, the IC card 3 is ready to execute command processing.
  • the CPU 11 transmits a select command for selecting the application to the IC card 3 via the card reader writer 15 , thereby causing the IC card 3 to execute the application. As a result, the IC card 3 is ready to execute the verification process.
  • the CPU 11 acquires the read biometric information from the user of the IC card 3 by the biological sensor 16 .
  • the CPU 11 generates a verification command including the read biometric information.
  • the CPU 11 transmits a verification command to the IC card 3 via the card reader writer 15 , thereby causing the IC card 3 to execute the verification process.
  • the CPU 11 receives a result of the verification process (a verification process result) from the IC card 3 .
  • the CPU 11 can use the verification process result for various processes.
  • the CPU 11 may be configured to determine whether the user is permitted to pass to a specific area on the basis of the verification process result.
  • the CPU 11 may be configured to open and close a door for preventing the user from entering a specific area on the basic of a result of determining whether or not passage is permitted. That is, the IC card processing device 2 may be configured as an entrance and exit management device.
  • FIG. 2 is an explanatory diagram for explaining an example of a verification command generated by the CPU 11 of the IC card processing device 2 .
  • the verification command has fields such as “CLA”, “INS”, “P1”, “P2”, “Lc”, and “Data”.
  • CLA” and “INS” are information indicating a type of command.
  • P1” and “P2” are parameters used in a command process according to the command.
  • Lc is information indicating a length of “Data”.
  • Data is a data body of the command.
  • the CPU 11 sets values corresponding to the verification command to “CLA”, “INS”, and “Lc”. Further, the CPU 11 stores the read biometric information in “Data”. Further, the CPU 11 sets values of “P1” and “P2” according to the processing contents of the verification process executed by the IC card 3 .
  • P1 is used to designate a threshold value in the verification process to be executed in the IC card 3 . It should be noted that the CPU 11 may not designate the threshold value in the verification process. For example, the CPU 11 sets “00” to “P1” when not designating a threshold value in the verification process.
  • P2 is used to designate a type of the biometric information (a biometric type) used in the verification process and a verification algorithm used in the verification process.
  • the biometric type is information indicating one of a plurality of biometric information such as a fingerprint, a face, a vein, an iris, and the like.
  • the verification algorithm is information indicating one of a plurality of methods executable for each biometric type.
  • P2 may further include information for designating one of the plurality of pieces of biometric information. For example, fingerprint data and the like are different for each finger. In such a case, “P2” may further include information indicating which finger a finger of a fingerprint is.
  • a first bit b 1 to a third bit b 3 of “P2” are used for designating the biometric type
  • a fourth bit b 4 to a fifth bit b 5 are used for designating the biometric information
  • a sixth bit b 6 to an eighth bit b 8 are used for designating the verification algorithm. Note that, when the biometric type and the verification algorithm to be used in the verification process are determined in advance, the CPU 11 may not designate the biometric type and the verification algorithm in the verification process by “P2”.
  • the IC card 3 performs the verification process in response to the verification command from the IC card processing device 2 .
  • FIG. 3 is an explanatory diagram for explaining an example of a configuration of the IC card 3 .
  • the IC card 3 includes, for example, a card-like main body 21 and an IC module 22 built in the main body 21 .
  • the IC module 22 includes an IC chip 23 and a communication circuitry (not shown) connected to the IC chip 23 .
  • the communication circuitry is configured as, for example, an antenna or a contact terminal (a contact pattern).
  • the communication circuitry is electrically or magnetically connected to the card reader writer 15 of the IC card processing device 2 .
  • the IC chip 23 includes a communication unit 24 , a CPU 25 , an ROM 26 , an RAM 27 , a nonvolatile memory 28 , a power supply unit 31 , and the like.
  • the communication unit 24 , the CPU 25 , the ROM 26 , the RAM 27 , the nonvolatile memory 28 , and the power supply unit 31 are connected to each other via a bus.
  • the communication unit 24 is a circuitry for communicating with the IC card processing device 2 .
  • the communication unit 24 transmits and receives data to and from the IC card processing device 2 through contact communication or contactless communication via the communication circuitry described above.
  • the communication unit 24 performs a signal processing on a signal transmitted from the IC card processing device 2 , thereby acquiring data such as a command transmitted by the IC card processing device 2 .
  • the communication unit 24 supplies the acquired data to the CPU 25 .
  • the communication unit 24 generates a signal on the basis of data such as a response supplied from the CPU 25 , and transmits the generated signal to the IC card processing device 2 .
  • the CPU 25 is an arithmetic element (for example, a processor) that executes arithmetic processing.
  • the CPU 25 performs various processes on the basis of data such as programs stored in the ROM 26 or the nonvolatile memory 28 .
  • the CPU 25 By executing the programs stored in the ROM 26 or the nonvolatile memory 28 , the CPU 25 functions as a control unit capable of executing various operations.
  • the ROM 26 is a read-only nonvolatile memory.
  • the ROM 26 stores the programs and data used by the programs.
  • the ROM 26 is incorporated in the IC card 3 in a state where the programs, data and the like are stored at the manufacturing stage.
  • the programs and data stored in the ROM 26 are determined by a specification of the IC card 3 .
  • the RAM 27 is a volatile memory functioning as a working memory.
  • the RAM 27 temporarily stores data under processing of the CPU 25 and the like. Further, the RAM 27 temporarily stores data received via the communication unit 24 . Further, the RAM 27 temporarily stores data to be transmitted via the communication unit 24 . Furthermore, the RAM 27 temporarily stores the programs executed by the CPU 25 .
  • the nonvolatile memory 28 is a storage medium capable of storing various information.
  • the nonvolatile memory 28 stores the programs, data used by the programs, and the like.
  • the nonvolatile memory 28 is composed of, for example, a semiconductor memory or the like.
  • the nonvolatile memory 28 stores, for example, a plurality of pieces of biometric information and a plurality of verification programs corresponding to a plurality of verification algorithms.
  • the power supply unit 31 supplies electric power to each unit of the IC card 3 .
  • the power supply unit 31 converts the electric power supplied from the IC card processing device 2 via the communication circuitry to rated voltage for each unit and supplies the rated voltage to each unit. It should be noted that the power supply unit 31 may be configured to include a battery and supply electric power of the battery to each unit.
  • the IC card 3 is issued by a primary issuance and a secondary issuance.
  • An issuing device for issuing the IC card 3 defines an area for storing data in the nonvolatile memory 28 of the IC card 3 in the primary issuance.
  • the issuing device creates, for example, a file structure prescribed by ISO/IEC 7816 in the nonvolatile memory 28 .
  • the issuing device issues the IC card 3 by writing the data in the area defined by the primary issuance.
  • the data written in the secondary issuance includes information on the user of the IC card 3 , for example.
  • the issuing device writes the biometric information previously acquired from a humanbeings' biological body of the user of the IC card 3 in the nonvolatile memory 28 of the IC card 3 as the registered biometric information.
  • the registered biometric information is, for example, information on the fingerprint of the user of the IC card 3 .
  • the registered biometric information is fingerprint data generated from the image of the fingerprint of the user of the IC card 3 .
  • the registered biometric information is not limited to information related to fingerprints.
  • the registered biometric information may be any biometric information acquired from a humanbeings' biological body such as a fingerprint, a face, a vein, an iris, and the like.
  • the registered biometric information may be plural. That is, the registered biometric information may include a plurality of pieces of biometric information related to a fingerprint, a face, a vein, an iris, and the like.
  • the CPU 25 executes the programs stored in the ROM 26 or the nonvolatile memory 28 , thereby functioning as a biometric information acquiring unit 32 , a degree of similarity calculation unit 34 , and a response control unit 36 as shown in FIG. 7 .
  • the CPU 25 analyzes the verification command transmitted from the IC card processing device 2 and acquires the biometric information (the read biometric information) included in the verification command.
  • the CPU 25 functions as the biometric information acquiring unit 32 .
  • the IC card 3 may be provided with a biological sensor for acquiring biometric information from the humanbeings' biological body.
  • the biological sensor and the CPU 25 controlling the biological sensor function as the biometric information acquiring unit 32 .
  • the biological sensor includes, for example, a camera for photographing a user's fingerprint, face, iris, and the like.
  • the CPU 25 compares the read biometric information with the registered biometric information stored in the nonvolatile memory 28 and calculates the degree of similarity.
  • the CPU 25 functions as the degree of similarity calculating unit 34 .
  • the CPU 25 calculates a concordance rate between the read biometric information acquired from the verification command and the registered biometric information stored in the nonvolatile memory 28 as the degree of similarity.
  • the verification algorithm for calculating the concordance rate may be, for example, a feature point method, a relation method, or any other known verification algorithm.
  • the CPU 25 when receiving a command from the IC card processing device 2 , the CPU 25 recognizes a process corresponding to the command and executes the recognized process (a command process). The CPU 25 transmits a response including a result of the command process (a command process result) to the IC card processing device 2 by the communication unit 24 . In this case, the CPU 25 functions as a response control unit 36 responding in response to the command.
  • the CPU 25 executes a verification process.
  • the verification process is a process of calculating the degree of similarity between the read biometric information acquired from the verification command and the registered biometric information and transmitting a response corresponding to the calculated degree of similarity to the IC card processing device 2 as the verification process result. That is, when receiving the verification command from the IC card processing device 2 , the CPU 25 calculates the degree of similarity between the read biometric information and the registered biometric information, and transmits the verification process result corresponding to the calculated degree of similarity to the IC card processing device 2 .
  • the CPU 25 When executing the verification process, the CPU 25 first calculates the degree of similarity. When calculating the degree of similarity, the CPU 25 recognizes the biometric type and the verification algorithm used for calculating the degree of similarity on the basis of the received verification command. Further, the CPU 25 acquires the registered biometric information corresponding to the recognized biometric type. Note that, when a plurality of pieces of biometric information (the registered biometric information) is associated with each biometric type, the CPU 25 recognizes and reads one of the plurality of pieces of registered biometric information on the basis of the received verification command.
  • FIG. 4 is an explanatory diagram for explaining the correspondence relationship among the biometric type, the biometric information, and the verification algorithm.
  • the CPU 25 recognizes the biometric type according to a value of the verification command. Specifically, as shown in FIG. 4 , the CPU 25 recognizes the biometric type of the biometric information used for the verification process on the basis of the values of the first bit b 1 to the third bit b 3 .
  • the CPU 25 recognizes which registered biometric information among the plurality of pieces of registered biometric information is to be used for the verification process, according to the value of the verification command. Specifically, as shown in FIG. 4 , the CPU 25 recognizes the registered biometric information used for the verification process on the basis of the values of the fourth bit b 4 to the fifth bit b 5 . Further, the CPU 25 reads out the recognized registered biometric information.
  • the CPU 25 recognizes the verification algorithm according to the value of the verification command. Specifically, as shown in FIG. 4 , the CPU 25 recognizes the verification algorithm to be used for the verification process on the basis of the values of the sixth bit b 6 to the eighth bit b 8 .
  • the CPU 25 calculates the degree of similarity between the acquired read biometric information and the registered biometric information using the recognized verification algorithm. That is, the CPU 25 calculates the concordance rate between the acquired read biometric information and the registered biometric information on the basis of the verification algorithm specified by the verification command.
  • the CPU 25 generates a response according to the degree of similarity calculated by the degree of similarity calculating unit 34 .
  • the CPU 25 adds information indicating a level of the degree of similarity to the response according to the calculated degree of similarity.
  • the CPU 25 compares at least three threshold value ranges with the calculated degree of similarity, and recognizes in which threshold value range the calculated degree of similarity is included.
  • the CPU 25 adds information indicating the level of the degree of similarity to the response according to the threshold value range in which the calculated degree of similarity is included.
  • the information indicating the level of the degree of similarity indicates a comparison result of at least three threshold value ranges and the degree of similarity, and there are at least three types of information indicating the level of the degree of similarity.
  • the information indicating the level of the degree of similarity may be a value of the calculated degree of similarity.
  • FIG. 5 is an explanatory diagram for explaining a correspondence relationship between the threshold value range and the information indicating the level of the degree of similarity.
  • the nonvolatile memory 28 of the IC card 3 stores in advance a table as shown in FIG. 5 in which a plurality of threshold value ranges and status words are associated with each other.
  • the status word is information indicating the level of the degree of similarity.
  • the CPU 25 recognizes the threshold value range in which the calculated degree of similarity is included, among the plurality of threshold value ranges in the table.
  • the CPU 25 selects a status word associated with the recognized threshold value range as a status word to be added to the response.
  • the threshold value ranges are “90% or more”, “80% or more and less than 90%”, “70% or more and less than 80%”, and “less than 70%.”
  • Information indicating the level of the degree of similarity is associated with each of these threshold value ranges in advance. In this case, the number of threshold value ranges is four.
  • the status word is one of “normality (value: 9000)”, “warning (value: 6280)”, “warning (value: 6270)”, and “abnormality (value 6300)”.
  • the status word “normality (value: 9000)” is associated with the threshold value range “90% or more”. That is, the status word “normality (value: 9000)” indicates that the degree of similarity is 90% or more.
  • the status word “warning (value: 6280)” is associated with the threshold value range “80% or more and less than 90%”. That is, the status word “warning (value: 6280)” indicates that the degree of similarity is 80% or more and less than 90%.
  • the status word “warning (value: 6270)” is associated with the threshold value range “70% or more and less than 80%”. That is, the status word “warning (value: 6270)” indicates that the similarity is 70% or more and less than 80%.
  • the status word “abnormality (value 6300)” is associated with the threshold value range “less than 70%”.
  • the status word “abnormality (value 6300)” indicates that the degree of similarity is less than 70%.
  • FIG. 6 is a flow chart for explaining the operation of the IC card 3 .
  • the CPU 25 of the IC card 3 receives the verification command transmitted from the IC card processing device 2 (step S 11 ).
  • the CPU 25 analyzes the received verification command (step S 12 ).
  • the CPU 25 analyzes the verification command, thereby acquiring the read biometric information stored in the verification command (step S 13 ).
  • the CPU 25 analyzes the verification command, thereby acquiring the read biometric information stored in the verification command.
  • the CPU 25 analyzes the verification command, thereby recognizing the biometric type specified by the verification command (step S 14 ).
  • the CPU 25 analyzes the verification command, thereby acquiring the biometric information (registered biometric information) specified by the verification command (step S 15 ). That is, the CPU 25 acquires registered biometric information corresponding to the biometric type from the nonvolatile memory 28 . Note that when a plurality of pieces of registered biometric information is associated with each biometric type in the nonvolatile memory 28 , the CPU 25 acquires the registered biometric information specified by the verification command among the plurality of pieces of registered biometric information from the nonvolatile memory 28 .
  • the CPU 25 analyzes the verification command, thereby recognizing the verification algorithm specified by the verification command (step S 16 ).
  • the CPU 25 calculates the degree of similarity between the read biometric information and the registered biometric information by the verification algorithm recognized in step S 16 (step S 17 ).
  • the CPU 25 selects the status word to be added to the response according to the calculated degree of similarity (step S 18 ). That is, the CPU 25 recognizes in which threshold value range of the plurality of threshold value ranges the calculated degree of similarity is included, in the table in which the plurality of threshold value ranges are associated with status words. The CPU 25 selects a status word associated with the recognized threshold value range as a status word to be added to the response. In the example of FIG. 5 , for example, when the calculated degree of similarity is 86%, the CPU 25 selects the status word “warning (value: 6280)” as information indicating the degree of similarity.
  • the CPU 25 generates a response using the selected status word (step S 19 ).
  • the CPU 25 transmits the generated response to the IC card processing device 2 (step S 20 ).
  • the IC card 3 configured as described above includes a communication unit 24 that communicates with the IC card processing device 2 as an external device and a nonvolatile memory 28 that stores in advance the registered biometric information as a first biometric information.
  • the CPU 25 of the IC card 3 acquires the read biometric information read from the humanbeings' biological body, as a second biometric information, from the verification command transmitted from the IC card processing device 2 , calculates the degree of similarity between the registered biometric information and the read biometric information, and transmits information indicating a level of the degree of similarity to the IC card processing device 2 by the communication unit 24 .
  • the IC card 3 can transmit, to the IC card processing device 2 , as a verification process result, the information indicating the level of the degree of similarity, but not information indicating whether or not the degree of similarity between the registered biometric information and the read biometric information is equal to or more than a predetermined threshold value.
  • the biometric authentication system 1 can cause the IC card processing device 2 to execute different processing depending on the level of the degree of similarity. Therefore, by using the IC card 3 , it is possible to construct a more flexible system. For example, it is possible to set the processing depending on the verification process result to the IC card processing device 2 according to a location where the IC card processing device 2 is installed.
  • the CPU 25 of the IC card 3 is configured to add the status word associated with the threshold value range including the calculated degree of similarity to the response, but the CPU 25 is not limited to this configuration.
  • the CPU 25 may be configured to select a status word that is added to the response on the basis of the threshold value specified by the verification command. That is, the information indicating the level of the degree of similarity indicates the comparison result of the threshold value specified from the external device and the degree of similarity.
  • the CPU 25 may be configured to add a status word “normality (value: 9000)” to a response when the calculated degree of similarity is equal to or greater than the threshold value specified by “P1”, and add a status word “abnormality (value: 6300)” to a response when the calculated degree of similarity is less than the threshold value specified by “P1”.
  • the IC card processing device 2 can cause the IC card 3 to execute a verification process in which the reading condition is taken into account.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Mathematical Physics (AREA)
  • Collating Specific Patterns (AREA)
  • Credit Cards Or The Like (AREA)
US16/177,868 2016-06-27 2018-11-01 Ic card, portable electronic device, and method of controlling an ic card Abandoned US20190073465A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
JP2016126577A JP2018005272A (ja) 2016-06-27 2016-06-27 Icカード、携帯可能電子装置、及びicカードの制御方法
JP2016-126577 2016-06-27
PCT/JP2017/023185 WO2018003689A1 (ja) 2016-06-27 2017-06-23 Icカード、携帯可能電子装置、及びicカードの制御方法

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2017/023185 Continuation WO2018003689A1 (ja) 2016-06-27 2017-06-23 Icカード、携帯可能電子装置、及びicカードの制御方法

Publications (1)

Publication Number Publication Date
US20190073465A1 true US20190073465A1 (en) 2019-03-07

Family

ID=60786419

Family Applications (1)

Application Number Title Priority Date Filing Date
US16/177,868 Abandoned US20190073465A1 (en) 2016-06-27 2018-11-01 Ic card, portable electronic device, and method of controlling an ic card

Country Status (7)

Country Link
US (1) US20190073465A1 (ja)
EP (1) EP3477587A4 (ja)
JP (1) JP2018005272A (ja)
KR (1) KR20190009782A (ja)
CN (1) CN109196515A (ja)
TW (1) TWI639958B (ja)
WO (1) WO2018003689A1 (ja)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220052841A1 (en) * 2018-12-12 2022-02-17 Nec Corporation Matching system, client and server
JP7414545B2 (ja) * 2020-01-20 2024-01-16 株式会社東芝 携帯可能な認証デバイス、icカードおよび認証システム
EP4099195A4 (en) * 2020-01-30 2023-01-25 NEC Corporation SERVER DEVICE, TERMINAL, AUTHENTICATION SYSTEM, AUTHENTICATION METHOD AND STORAGE MEDIA

Family Cites Families (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3620391B2 (ja) * 2000-02-23 2005-02-16 日本電気株式会社 指紋入力装置及びそれに用いる画像判定方法並びにその制御プログラムを記録した記録媒体
CZ2005209A3 (cs) * 2002-09-10 2005-12-14 Ivi Smart Technologies, Inc. Bezpečné biometrické ověření identity
JP4387273B2 (ja) * 2004-09-10 2009-12-16 東芝テック株式会社 個人認証装置
JP2006107302A (ja) * 2004-10-08 2006-04-20 Fujitsu Ltd 生体認証方法及び生体認証装置
AR051670A1 (es) * 2004-11-16 2007-01-31 Imageware Systems Inc Plataforma biometrica multimodal
KR100747446B1 (ko) * 2005-03-07 2007-08-09 엘지전자 주식회사 휴대단말기의 지문인식 장치 및 방법
JP4684013B2 (ja) * 2005-06-06 2011-05-18 株式会社日立製作所 本人認証システム
WO2007023756A1 (ja) * 2005-08-24 2007-03-01 Nec Corporation 本人認証システム、ユーザ端末、サービス事業者装置、信頼性保証サーバ、これらの動作方法と動作プログラム
TWI308300B (en) * 2006-05-03 2009-04-01 Univ Nat Formosa Identification of algorithm and apparatus based on knuckle wrinkles
JP4977425B2 (ja) * 2006-09-28 2012-07-18 Necカシオモバイルコミュニケーションズ株式会社 携帯端末装置及びプログラム
TWM372978U (en) * 2009-09-09 2010-01-21 Wu-Shu Lin Electronic smart card with anti-fake function
CN102024172B (zh) * 2009-09-23 2014-11-26 虹堡科技股份有限公司 具有安全防护介面的复合式晶片卡结构及控制方法
TWM396452U (en) * 2010-03-17 2011-01-11 Chen Shiang Intellectual Property Inc Smart card apparatus containing touch display unit
JP2012018432A (ja) * 2010-07-06 2012-01-26 Hitachi Omron Terminal Solutions Corp 生体認証装置および生体認証方法
JP5388991B2 (ja) * 2010-11-10 2014-01-15 日立オムロンターミナルソリューションズ株式会社 生体認証ユニット、自動取引処理装置、生体認証方法、及び生体認証プログラム
TWI560616B (en) * 2011-08-02 2016-12-01 Corning Inc Biometric-enabled smart card
JP5903257B2 (ja) * 2011-12-08 2016-04-13 株式会社Nttファシリティーズ 認証システム、登録装置、及び認証装置
JP2013156831A (ja) * 2012-01-30 2013-08-15 Toshiba Corp 携帯可能電子装置及びicカード
JP2013196296A (ja) * 2012-03-19 2013-09-30 Toshiba Corp 携帯可能電子装置及びicカード
TW201502996A (zh) * 2013-04-02 2015-01-16 Tnt Partners Llc 可程式電子卡、可程式電子卡總成及其處理方法
TWM516750U (zh) * 2015-09-30 2016-02-01 Chu Ka Ind Co Ltd 具指紋辨識之晶片卡

Also Published As

Publication number Publication date
TWI639958B (zh) 2018-11-01
TW201804375A (zh) 2018-02-01
CN109196515A (zh) 2019-01-11
EP3477587A1 (en) 2019-05-01
KR20190009782A (ko) 2019-01-29
JP2018005272A (ja) 2018-01-11
WO2018003689A1 (ja) 2018-01-04
EP3477587A4 (en) 2020-01-22

Similar Documents

Publication Publication Date Title
US10528857B2 (en) IC card, portable electronic device, and information processing method
US8692655B2 (en) Dynamically programmable RFID transponder
US20190180018A1 (en) Portable electronic device
US10817767B2 (en) IC card and portable electronic device
US11164061B2 (en) IC card, portable electronic device, IC card processing method and program
US20190073465A1 (en) Ic card, portable electronic device, and method of controlling an ic card
KR102427853B1 (ko) 사용자 인증을 위한 등록 데이터베이스의 적응적 갱신 방법 및 장치
CN105718920A (zh) 指纹识别方法及指纹识别装置
US20180276357A1 (en) Ic card and method for controlling ic card
US10915616B2 (en) IC module, IC card, and verification device
US20170374066A1 (en) Server, ic card processing apparatus, and ic card processing system
US20120234926A1 (en) Portable electronic apparatus
US20230214474A1 (en) Portable electronic device and ic card
US8665070B2 (en) Mobile electronic device
US20220156546A1 (en) Portable electronic device, ic card and program
JP2013156831A (ja) 携帯可能電子装置及びicカード
KR20220006349A (ko) 바이오 인식용 스마트 카드의 돌입전류 유입방지장치
JP2015087965A (ja) Icカード、携帯可能電子装置、及び、icカード処理装置
KR20040052641A (ko) 지문 센서 일체형 인증 장치

Legal Events

Date Code Title Description
AS Assignment

Owner name: TOSHIBA INFRASTRUCTURE SYSTEMS & SOLUTIONS CORPORA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:KURIYAMA, RYOUICHI;REEL/FRAME:047384/0978

Effective date: 20181026

Owner name: KABUSHIKI KAISHA TOSHIBA, JAPAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:KURIYAMA, RYOUICHI;REEL/FRAME:047384/0978

Effective date: 20181026

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION